Vulnerability management started with scanning — identify assets, fingerprint software, and match scan findings to known CVEs. Then came “risk-based” approaches that promised smarter prioritization. But in practice, most programs still just patch what scores the highest.
Risk is inferred, not proven. Fixes are assumed to work. And security teams are left guessing what actually matters.
Horizon3.ai is changing that.
With NodeZero®, we’ve redefined Risk-Based Vulnerability Management (RBVM) to focus on what attackers can actually exploit, what adversaries are actively using, and what happens when they succeed. Our model is grounded in proof, not prediction.
In terms of “Risk”, our approach is built on these three core principles:
Horizon3.ai has just announced six new NodeZero capabilities that form a complete system for operationalizing Risk-Based Vulnerability Management. Under the three core principles mentioned above are the following:
Offensive Security Platform
Autonomous Pentesting Engine
↓
↑
Natural language–driven control
Horizon3.ai’s approach isn’t just about improved prioritization. It’s a complete operational model for measuring, managing, and eliminating real-world risk. Let’s look a little closer at these new capabilities.
Validates whether EDRs detect real-world attacker behavior like credential dumping, privilege escalation, and lateral movement in production.
Finds, classifies, and validates sensitive, exploitable data using LLMs to assess what attackers can steal and how they’d use it.
Correlates NodeZero’s discovered attack paths to known adversary TTPs (e.g., Cozy Bear, FIN7). Helps prioritize risk based on real-world threat alignment, not just CVEs.
Automatically identifies and tests access paths to crown-jewel users and systems with no tagging or manual tuning required.
Only surfaces vulnerabilities and weaknesses proven to be exploitable through real attack paths, and tracks remediation with fix verification.
Enables natural-language control of NodeZero for automating vulnerability remediation workflows. Trigger retests, query status, or launch new ops instantly, powering our closed-loop Find–Fix–Verify approach to mitigating risk.
Core Principle | Capability | What It Answers |
Exploitable Attack Surface | Endpoint Security Effectiveness | Are endpoint defenses working? |
Precise Business Impact | Advanced Data Pilfering | What valuable data could be stolen? |
Threat Actor Pressure | Threat Actor Mapping | Who uses these tactics in the real world? |
Precise Business Impact | High-Value Targeting | What matters most if compromised? |
Consolidates discovered risks | Vulnerability Mgmt Hub | What has been exploited, not just detected? |
Provides workflow automation | MCP Server | How do we automate remediation and verification? |
Traditional RBVM treats remediation as the finish line, assuming a patch was applied and calling the risk resolved. But assumptions don’t stop attackers.
NodeZero flips that model by anchoring every action in proof. It starts by showing what’s truly exploitable, guides remediation with full context, and only closes the loop when the risk is confirmed as “remediated”.
This loop isn’t theoretical. It’s the operational backbone of how modern security teams measure outcomes, validate fixes, and prove impact. Here are some more details about how this loop works:
NodeZero executes real attacks across your environment to uncover exploitable weaknesses, not just theoretical CVEs.
NodeZero delivers detailed remediation guidance, including business impact, and exploit context directly into tools like ServiceNow and Jira.
NodeZero re-runs the attack path. If the issue is still exploitable, it stays open. If not, the fix is confirmed, with full visibility and timestamped proof.
This is how the six capabilities work together during a real-world NodeZero assessment:
*Note: Introduced in 2024, NodeZero Tripwires™ convert real pentest findings into targeted deception — deploying lures where intrusions are most likely. When touched, they deliver high-fidelity alerts with full context, turning offense into defensive detection.
Here are a few Find–Fix–Verify loop examples that are in production today:
Key benefits of the six new capabilities for stakeholders:
Security Leaders Uncover
SOC & Detection Engineers Learn
GRC & Audit Teams Discover
NodeZero isn’t just a pentesting tool. It’s an offensive security platform that helps you identify, reduce, and verify real-world risk across your exploitable attack surface, adversary behavior, and critical business assets.
If your RBVM program still relies on scanner exports and unverified fixes, it’s time to evolve.